Windows Hacking and Security
Microsoft Windows is the most popular, the most ubiquitous operating system in the world.
It’s present on Servers, Clients and mobile devices. In fact, chances are good, that, if you walk
into any building today, you’re gonna find, at least, one device, running some version,
of the Windows, operating system.
It’s present on Servers, Clients and mobile devices. In fact, chances are good, that, if you walk
into any building today, you’re gonna find, at least, one device, running some version,
of the Windows, operating system.
At my day job, I’m responsible for, the administration, and security,
of dozens, of Windows Servers, and hundreds, of Windows Clients.
of dozens, of Windows Servers, and hundreds, of Windows Clients.
Speaking of security, we often think of hackers, as people who are external to the organization.
So we deploy software firewalls, hardware firewalls, proxy servers, intrusion detection mechanisms,
and physical-access measures to keep external intruders at bay.
So we deploy software firewalls, hardware firewalls, proxy servers, intrusion detection mechanisms,
and physical-access measures to keep external intruders at bay.
But the truth is, external attackers are not the only threats to the security of our business.
A competent security administrator understands that company employees,
are just as likely to do harm, as external attackers. And this is a real problem because,
trusted employees already have access to the company’s network, they have authorization
to go in and out of the building, and this makes it much more difficult to impose
security measures on trusted entities.
are just as likely to do harm, as external attackers. And this is a real problem because,
trusted employees already have access to the company’s network, they have authorization
to go in and out of the building, and this makes it much more difficult to impose
security measures on trusted entities.
In this course, using a series of very practicable techniques, I'm going to show you:
- how easily a Windows Network can be breached, and
- how to protect your Windows Network.
Who is the target audience?
- Anyone who wants to learn the inherent weaknesses in the Windows OS
- Students wanting to learn how to protect a Windows Network from "Internal Intruders"
- IT Pros responsible for the administration and security of a Windows Network
Code 1
Code 2
0 Comments